Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
86ef2a66c72c1d358578f09b15ae4dc0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
86ef2a66c72c1d358578f09b15ae4dc0N.exe
Resource
win10v2004-20240709-en
General
-
Target
86ef2a66c72c1d358578f09b15ae4dc0N.exe
-
Size
78KB
-
MD5
86ef2a66c72c1d358578f09b15ae4dc0
-
SHA1
b84d8932f011b1f3a2b923af8ae2a2359142a4a5
-
SHA256
62fff19daf26f0eabeb7f64b8261ce206b5568478bf26e56d49b7c6ecec26feb
-
SHA512
7ca899f0df1d3e605f2a7443e578fa382f091b0e5fd6f70f1287bd4315210a6373fae6283cd8da664e556a8d4f68332ce7d10be0214654f252f3833902547fe8
-
SSDEEP
1536:Yy58fXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQt96b9/Qd1W2:Yy58/SyRxvhTzXPvCbW2UI9/8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
tmp760.tmp.exepid process 2716 tmp760.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
86ef2a66c72c1d358578f09b15ae4dc0N.exepid process 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp760.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp760.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
86ef2a66c72c1d358578f09b15ae4dc0N.exevbc.execvtres.exetmp760.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86ef2a66c72c1d358578f09b15ae4dc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp760.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
86ef2a66c72c1d358578f09b15ae4dc0N.exetmp760.tmp.exedescription pid process Token: SeDebugPrivilege 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe Token: SeDebugPrivilege 2716 tmp760.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
86ef2a66c72c1d358578f09b15ae4dc0N.exevbc.exedescription pid process target process PID 2772 wrote to memory of 2560 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe vbc.exe PID 2772 wrote to memory of 2560 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe vbc.exe PID 2772 wrote to memory of 2560 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe vbc.exe PID 2772 wrote to memory of 2560 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe vbc.exe PID 2560 wrote to memory of 2932 2560 vbc.exe cvtres.exe PID 2560 wrote to memory of 2932 2560 vbc.exe cvtres.exe PID 2560 wrote to memory of 2932 2560 vbc.exe cvtres.exe PID 2560 wrote to memory of 2932 2560 vbc.exe cvtres.exe PID 2772 wrote to memory of 2716 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe tmp760.tmp.exe PID 2772 wrote to memory of 2716 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe tmp760.tmp.exe PID 2772 wrote to memory of 2716 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe tmp760.tmp.exe PID 2772 wrote to memory of 2716 2772 86ef2a66c72c1d358578f09b15ae4dc0N.exe tmp760.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86ef2a66c72c1d358578f09b15ae4dc0N.exe"C:\Users\Admin\AppData\Local\Temp\86ef2a66c72c1d358578f09b15ae4dc0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ts34c9pg.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7FD.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7FC.tmp"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp760.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp760.tmp.exe" C:\Users\Admin\AppData\Local\Temp\86ef2a66c72c1d358578f09b15ae4dc0N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES7FD.tmpFilesize
1KB
MD5cfcf918589824c4dce9d57f2faa458c6
SHA16df0fe99f1a6cd7c24b6fb258ca94e560f99b1df
SHA25663ced3cfca33ad67e92fa7f969ff1ee1b3eaa2b3a22d6e1430e4eb83cc7796e3
SHA5128c9dcf8dd6613bc1fc8fcb116ff1c4c3c754112e8ba0f03ecc95389fea02e913ffed9b64f03678c150ad855d7f915778ba68474a68a7f3683c5aad2de1e9c738
-
C:\Users\Admin\AppData\Local\Temp\tmp760.tmp.exeFilesize
78KB
MD5b0e56cf6c4259a9e55e4684871fb7c8f
SHA12fa49530943b0c97544aa6b2c24baab6c9d361d8
SHA256599ec679fe77d6148a934ff7b2c0c8b4806a3652f304a257d0d7382e6e9043a3
SHA512e7d0a78176c0ac500f169cfa66ce365db78a31ce8f99f42bb35af27290671bb4f591a37f0f9808f05d731236ee9ba882bede56291b71068776f68989057118e3
-
C:\Users\Admin\AppData\Local\Temp\ts34c9pg.0.vbFilesize
14KB
MD5a2e80cfae374b87aba44a6fbb10fed90
SHA1deb0a4f9c757c80bbe0bf3fec1dd614913959ec8
SHA256724efa82ba8b15e2b7800d0e378d915a90267216401901c190eebf8f1287c84c
SHA512fd02a0490d14373048aa39238f7cc87acdb69e765645695cc6d180ead45e0760ff3d0ae5f41350aee00b5ce676c8e1bddf248546fd127350e2b3e39313374e32
-
C:\Users\Admin\AppData\Local\Temp\ts34c9pg.cmdlineFilesize
265B
MD506020ad8f4269f44e3a8b29349c068d7
SHA1e8324cbc2c9e7c9af56520ee9f248aa54b0ab51e
SHA256cad663a3623e1414517ae38a74dbbe239e1199d2d1c98219d1bf25e4d133637d
SHA5125cb6ad8640f3da997ff802fdabf0c7fb814a6664b13543c730395f1da8f5df3e9b7164d64c31cf469f5dd77c13430fd07cc9ab1bd9339f99c2e54317cb3ad7d0
-
C:\Users\Admin\AppData\Local\Temp\vbc7FC.tmpFilesize
660B
MD513919ca909b3c480200a1541961ef351
SHA153ebe955f84b543d17eac71d2421414f3a620a52
SHA256599a0159cd645ca31365dfd70d1e26f4819a5a547f210c6261f18a85e82ded35
SHA512af57a372e925940cb61e91699a42a571599ed8da033cf2f9dadd436154f6200a84d2ac1db2a7d4f51c2bc1a634b200040856c222e299eaf5ac0a03150d651fd4
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c
-
memory/2560-9-0x00000000743B0000-0x000000007495B000-memory.dmpFilesize
5.7MB
-
memory/2560-18-0x00000000743B0000-0x000000007495B000-memory.dmpFilesize
5.7MB
-
memory/2772-0-0x00000000743B1000-0x00000000743B2000-memory.dmpFilesize
4KB
-
memory/2772-1-0x00000000743B0000-0x000000007495B000-memory.dmpFilesize
5.7MB
-
memory/2772-2-0x00000000743B0000-0x000000007495B000-memory.dmpFilesize
5.7MB
-
memory/2772-24-0x00000000743B0000-0x000000007495B000-memory.dmpFilesize
5.7MB